SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Practical
Security Guide
to Prevent Cyber Extortion
2
European organizations are the
ones that suffer the highest
number of sensitive data theft.
The outlook for 2016 is that Europe will continue to be at risk of
cyberattacks.
91% of SMEs have been
targets of IT attacks
Source: Shopper Software Security in SMBs. Nielsen, April 2015
Ignoring malware
attacks is a risk not
worth taking.
Panda presents you with advice to keep your company safe and
your mind at ease.
4
What is Cyber
Extortion?
5
Cyber extortion is a form of
blackmail in which victims of
an IT attack are forced to pay
to avoid its effects.
One of the most widespread methods of cyber extortion is
ransomware. This attack encrypts the victim’s information
and then demands a ransom in order for the information to be
decrypted and returned.
Once involved in the blackmail, having paid the ransom
demanded by the cybercriminal, the victim of a cyber extortion
usually receives an email with the code to decrypt their
information. The method of payment is usually Bitcoin, a digital
currency that can be exchanged for real money (1 Bitcoin =
$380). In fact, they usually use this payment method to hamper
its traceability. However, the payment doesn’t guarantee that the
business won’t be attacked again in the future.
Other similar attacks that use this kind of extortion are ones
which infect your computer and access its webcam, then
blackmail you so that they do not spread the videos.
The majority of attacks start with emails that include attached
documents or by visiting unsecure websites.
39%
Unsafe and fraudulent websites
23%
Software download
19%
Malware received by email
Sources of Infection
Source: Shopper Software Security in SMBs. Nielsen, April 2015
6
How do cybercriminals
use ransomware for
attacks?
7
Ransomware such as
Cryptolocker, Cyptowall, or
Coinvault threaten the integrity
of files that are found on the
computer or network drives that
they have access to.
The malware encrypts the data so that it can only be decrypted
using a key that the cybercriminals will hand over if the business
pays the requested ransom.
If you are one of the companies affected by ransomware then
you usually have between 48 and 72 hours to pay the ransom. If
you don’t pay during this timeframe then the cost of decrypting
your data could increase.
If they offer you an extension but the payment hasn’t been
completed, it’s possible that they will delete the decryption key,
making it impossible to recover the company’s files.
Even if the payment is carried out, there is no guarantee that
your data will be returned. This is because it is possible that the
software developed by the cybercriminals contains bugs that
cause a corruption in the decryption process, or law enforcement
agencies are constantly trying to interrupt the cybercriminals
infrastructure.
8
What to do if you
are a victim of cyber
extortion?
9
Don’t give in to
the cybercriminals’
blackmail.
There is no guarantee that this will solve
the problem.
In fact, in many cases, the victim of the
blackmailing has given over the amount
demanded but without receiving the
decryption key (or even a corrupted key).
None of these outcomes can help get the
kidnapped information back.
Repeated blackmailing is also common.
Once the information is returned, the
cybercriminals install processes which
continue to encrypt the company’s data
in no time.
On other occasions, the cybercriminal
negotiates a higher amount than
originally demanded, depending on the
perceived desperation of the victim or
the company’s financial situation.
Completely wipe all
traces of malware
from your computers.
To do this, Panda recommends using
Cloud Cleaner in offline mode, a solution
that specializes in removing all traces
of advanced viruses from affected
computers.
Recover all
your encrypted
files.
To do this it is necessary to have
previously activated the File History
(in Windows 8.1 and 10) or System
Protection (Windows 7 and Vista), which
will allow for changes made by the
malware on data files to be reversed.
It is also recommended that you make
security copies of critical files every so
often. Should you have a recent backup
of your important documents we advise
scanning these for any remnants of
malware before restoring them.
It must be kept in
mind that this type
of threat has become
extremely popular.
In fact, ransomware is a billion-dollar industry. One estimate showed that a
single strain of ransomware, Cryptowall 3.0, made over $325 million from US
victims in 2015 alone.
Besides, the increased number of mutations, coupled with new strains of
ransomware that are constantly appearing, makes it difficult for traditional
antiviruses that are based on signature files to detect them.
This is why it is fundamental to have an advanced security solution that
detects and protects your computers from direct attacks, Zero-Days, and
new versions of Ransomware.
11
What does a malware consist
of and what are the most
common types?
Well, it is any type of malicious program or IT code whose
objective is to infiltrate networks and computers to cause
damage, spy, and steal information. The most dangerous types of
malware are:
RANSOMWARE
It blocks the PC, removing all user control, encrypts files
and demands a financial ransom to return them.
EXPLOIT
It takes advantage of a security fault or vulnerability in
the communication protocols to enter your computer.
SPYWARE
It collects names, access details, passwords, and any type
of information about your company.
PHISHING
It creates a false URL to obtain your data and steal your
identity, with the aim of stealing from your bank accounts.
TROJAN
It installs various applications so that hackers can control
the computer. They control your files and steal your
confidential information.
APT (ADVANCED PERSISTENT THREAT)
It’s a computer process that penetrates your security to
control and monitor it, being able to continually extract
information for business or political means.
SCAM
It tricks you with false promotions such as holidays or
lotteries, then asks you for money to access the “prize”.
BACKDOOR
It opens a “back door” to take control of your system.
KEYLOGGER
It collects and sends all keystrokes completed by the user.
BOT
It is a program that remotely controls your PC.
WORM
It infects all of your computers, slowing down the network
and even blocking access to communications.
12
Evolution of malware,
complexity and sophistication.
The technology used by traditional antiviruses (signature files,
heuristic) are reactive. 18% of new malware isn’t detected
by traditional antiviruses in the first 24 hours, and 2% is still
undetected 3 months later.
Can these antiviruses stop
advanced threats?
No antivirus can do this. In fact, There are websites online that
allow you to see if a certain malware will be detected by an
antivirus. Hackers then launch their malicious code once they
have verified that it won’t be detected by any antivirus.
24 hours
3 days
7 days
1 month
3 months
% Non-detected viruses
18%
9%
7%
4%
2%
70%
80%
90%
100%
13
Panda Security’s 5
Recommendations to
prevent Cyberattacks
14
Develop internal
protocols
Establish protocols and security measures to
control the installation and execution of any
software. You should also check the inventory of
your applications frequently.
A solution that fit
your needs
Ensure that you have the security solution that
your company needs and keep it updated.
A solution with different security layers that should
be able to detect and block advanced threats.
Make your
users aware
Make sure that your users know the risks of
phishing and that they don’t download unknown
applications - or ones not provided by the
company - and to avoid untrusted websites.
Be aware on the
Internet
Set out policies for surfing the Internet that
controls the reputation of websites that
can be accessed.
Keep your systems &
applications updated
Determine a policy for updating your applications
and for blocking or eliminating them if they aren’t
needed by the company.
It is very important to get protected from
applications that, even they are trustworthy
(such us Java, Office, Chrome, Mozilla or Adobe), they
can have some vulnerabilities or security holes
that can be exploited by cybercriminals.
15
Image: The toolbars present a big security risk.
16
How can you really
protect your company?
17
Panda Security has
developed the first solution
that guarantees continuous
monitoring of 100% of the
active processes.
Panda Security has developed the only cybersecurity solution
that is capable of protecting your company against direct
attacks, Zero-Days, or any type of advanced threat, including
Cryptolocker.
It is the first product on the market that guarantees to
completely protect computers and servers, thanks to
continuously monitoring 100% of the processes on the endpoint.
18
Adaptive Defense 360 offers
the greatest security levels
available, far ahead of any
other antivirus on the market.
Adaptive Defense 360 monitors, registers, and classifies 100%
of the running applications which, combined with EDR features,
allows us to detect and block the malware that other protection
systems don’t even see.
Traditional Antiviruses
They only recognize malware but nothing else.
Adaptive Defense 360
It monitors absolutely all the active processes.
Work flow
Risk
Managed Service
Objective: 0 Risk
As they can’t classify anything suspicious, these attacks
represent a huge security problem for the traditional antivirus
(especially targeted and zero-day attacks).
Adaptive Defense 360 knows with certainty if a process is good or
bad, it classifies absolutely everything so that there is no suspicion.
19
Being able to control
absolutely everything that
happens on your computers
allows you to:
Detect information leaks, both from malware and employees and
from any archive that contains data (pdf, word, excel, txt,...).
Discover and solve vulnerabilities on your systems and
applications, and prevent the use of unwanted programs.
Detect direct attacks aimed at your systems.
20
It detects and blocks the malware
that other systems miss.
Limitless Visibilty, Absolute Control
Monitors, records and classifies
100% of running applications.
21
It protects more than 500,000 endpoints
and servers worldwide.
It has mitigated more than 1,100,000
security breaches in the last year alone.
It has detected malware in 100% of the
environments it has been installed in,
independently of the existing protection
mechanisms.
It has saved more than 550,000 hours in IT
resources, which amounts to an estimated
saving of €34.8 million.
It has categorized more than 1.5 million
applications.
What’s more, it comes with Panda Security’s 25 years of experience, which makes us a pioneer in malware detection and in implementing
innovative security solutions.
Not to mention that more than 30 million endpoints are currently protected by Panda worldwide.
Adaptive Defense 360 in numbers
500K 1.5M
1.1M 550K
100%
Data from 2015.
BENELUX
+32 15 45 12 80
belgium@pandasecurity.com
BRAZIL
+55 11 3054-1722
brazil@pandasecurity.com
FRANCE
+33 (0) 1 46842 000
commercial@fr.pandasecurity.com
GERMANY (AND AUSTRIA)
+49 (0) 2065 961-0
sales@de.pandasecurity.com
GREECE
+30 211 18 09 000
greece@pandasecurity.com
HUNGARY
+36 1 224 03 16
hungary@pandasecurity.com
ITALY
+39 02 24 20 22 08
italy@pandasecurity.com
MEXICO
+52 55 8000 2381
mexico@pandasecurity.com
NORWAY
+47 93 409 300
norway@pandasecurity.com
PORTUGAL
+351 210 414 400
geral@pt.pandasecurity.com
SPAIN
+34 900 90 70 80
comercialpanda@pandasecurity.com
SWEDEN (FINLAND & DENMARK)
+46 0850 553 200
sweden@pandasecurity.com
SWITZERLAND
+41 22 994 89 40
info@ch.pandasecurity.com
UNITED KINGDOM
+44 (0) 844 335 3791
sales@uk.pandasecurity.com
USA (AND CANADA)
+1 877 263 3881
sales@us.pandasecurity.com
Contact us for more information

Contenu connexe

Tendances

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperNetIQ
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistMatthew Rosenquist
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionIBM Security
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...Amazon Web Services
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security ChallengesJorge Sebastiao
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKRobert Anderson
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachUlf Mattsson
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept*****Dominic A Ienco
 

Tendances (19)

Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
Top Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White PaperTop Solutions and Tools to Prevent Devastating Malware White Paper
Top Solutions and Tools to Prevent Devastating Malware White Paper
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
The-Enterprise-Immune-System-Using-Machine-Learning-for-Next-Generation-Cyber...
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Top 10 Security Challenges
Top 10 Security ChallengesTop 10 Security Challenges
Top 10 Security Challenges
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
 
Antigena Overview
Antigena OverviewAntigena Overview
Antigena Overview
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 

En vedette

Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Security
 
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risksGerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risksVanbreda Risk & Benefits
 
Panda Security - Presentación corporativa
Panda Security - Presentación corporativa Panda Security - Presentación corporativa
Panda Security - Presentación corporativa Panda Security
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...Abdulkadir Sugal
 

En vedette (7)

Panda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malwarePanda Adaptive Defense - The evolution of malware
Panda Adaptive Defense - The evolution of malware
 
Plep inteligencia humana
Plep inteligencia humanaPlep inteligencia humana
Plep inteligencia humana
 
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risksGerrit Mets, Cyber Insurance Expert, on corporate cyber risks
Gerrit Mets, Cyber Insurance Expert, on corporate cyber risks
 
Panda Security - Presentación corporativa
Panda Security - Presentación corporativa Panda Security - Presentación corporativa
Panda Security - Presentación corporativa
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Risk factor
Risk factorRisk factor
Risk factor
 
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...BUSNIESS AND INDUSTRIAL PRACTICES:  !) COMPETITION IN BUSINESS !!)BRIBERY AND...
BUSNIESS AND INDUSTRIAL PRACTICES: !) COMPETITION IN BUSINESS !!)BRIBERY AND...
 

Similaire à Panda Adaptive Defense 360 - Cyber Extortion Guide

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsProtected Harbor
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 

Similaire à Panda Adaptive Defense 360 - Cyber Extortion Guide (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

Plus de Panda Security

Entrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda SecurityEntrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda SecurityPanda Security
 
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security ¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security Panda Security
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar CyberattacksPanda Security
 
Panda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientesPanda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientesPanda Security
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security
 
Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017Panda Security
 
Ataques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridadAtaques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridadPanda Security
 
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...Panda Security
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityPanda Security
 
How can your information be kidnapped?
How can your information be kidnapped?How can your information be kidnapped?
How can your information be kidnapped?Panda Security
 
Traditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive DefenseTraditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive DefensePanda Security
 
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - InfographicAre (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - InfographicPanda Security
 
Ataques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda SecurityAtaques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda SecurityPanda Security
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security
 
Panda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hoteleroPanda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hoteleroPanda Security
 
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão CibernéticaPanda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão CibernéticaPanda Security
 
Guía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la CiberextorsiónGuía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la CiberextorsiónPanda Security
 
Panda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de FacebookPanda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de FacebookPanda Security
 

Plus de Panda Security (20)

Entrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda SecurityEntrevista a Juan Santamaria en El Pais Retina – Panda Security
Entrevista a Juan Santamaria en El Pais Retina – Panda Security
 
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security ¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
¿Qué es Threat Hunting y por qué lo necesitas? - Panda Security
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Panda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientesPanda Security: Protegemos la vida digital de nuestros clientes
Panda Security: Protegemos la vida digital de nuestros clientes
 
Panda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clientsPanda Security: Protecting the digital life of our clients
Panda Security: Protecting the digital life of our clients
 
Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017Informe Trimestral PandaLabs T1 2017
Informe Trimestral PandaLabs T1 2017
 
Ataques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridadAtaques en tiempo real, la tendencia que marca la ciberseguridad
Ataques en tiempo real, la tendencia que marca la ciberseguridad
 
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
PandaLabs: Hacking Attacks Carried Out in Real Time is the Latest Cybersecuri...
 
How to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda SecurityHow to prevent a Phishing attack - Panda Security
How to prevent a Phishing attack - Panda Security
 
How can your information be kidnapped?
How can your information be kidnapped?How can your information be kidnapped?
How can your information be kidnapped?
 
Traditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive DefenseTraditional Antivirus VS Adaptive Defense
Traditional Antivirus VS Adaptive Defense
 
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - InfographicAre (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
Are (IoT) Smart Homes of the Future As Smart As They Say? - Infographic
 
Ataques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda SecurityAtaques informáticos contra el sector sanitario -Panda Security
Ataques informáticos contra el sector sanitario -Panda Security
 
Panda Security - The Hotel Hijackers
Panda Security - The Hotel HijackersPanda Security - The Hotel Hijackers
Panda Security - The Hotel Hijackers
 
Panda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hoteleroPanda Security - El ciberexpolio hotelero
Panda Security - El ciberexpolio hotelero
 
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão CibernéticaPanda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
Panda Adaptive defense 360 - Guia para prevenir a Extorsão Cibernética
 
Guía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la CiberextorsiónGuía de Seguridad para prevenir la Ciberextorsión
Guía de Seguridad para prevenir la Ciberextorsión
 
Panda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de FacebookPanda Security - Guía de Privacidad de Facebook
Panda Security - Guía de Privacidad de Facebook
 

Dernier

Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROmotivationalword821
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 

Dernier (20)

Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
How To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTROHow To Manage Restaurant Staff -BTRESTRO
How To Manage Restaurant Staff -BTRESTRO
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 

Panda Adaptive Defense 360 - Cyber Extortion Guide

  • 2. 2 European organizations are the ones that suffer the highest number of sensitive data theft. The outlook for 2016 is that Europe will continue to be at risk of cyberattacks. 91% of SMEs have been targets of IT attacks Source: Shopper Software Security in SMBs. Nielsen, April 2015
  • 3. Ignoring malware attacks is a risk not worth taking. Panda presents you with advice to keep your company safe and your mind at ease.
  • 5. 5 Cyber extortion is a form of blackmail in which victims of an IT attack are forced to pay to avoid its effects. One of the most widespread methods of cyber extortion is ransomware. This attack encrypts the victim’s information and then demands a ransom in order for the information to be decrypted and returned. Once involved in the blackmail, having paid the ransom demanded by the cybercriminal, the victim of a cyber extortion usually receives an email with the code to decrypt their information. The method of payment is usually Bitcoin, a digital currency that can be exchanged for real money (1 Bitcoin = $380). In fact, they usually use this payment method to hamper its traceability. However, the payment doesn’t guarantee that the business won’t be attacked again in the future. Other similar attacks that use this kind of extortion are ones which infect your computer and access its webcam, then blackmail you so that they do not spread the videos. The majority of attacks start with emails that include attached documents or by visiting unsecure websites. 39% Unsafe and fraudulent websites 23% Software download 19% Malware received by email Sources of Infection Source: Shopper Software Security in SMBs. Nielsen, April 2015
  • 6. 6 How do cybercriminals use ransomware for attacks?
  • 7. 7 Ransomware such as Cryptolocker, Cyptowall, or Coinvault threaten the integrity of files that are found on the computer or network drives that they have access to. The malware encrypts the data so that it can only be decrypted using a key that the cybercriminals will hand over if the business pays the requested ransom. If you are one of the companies affected by ransomware then you usually have between 48 and 72 hours to pay the ransom. If you don’t pay during this timeframe then the cost of decrypting your data could increase. If they offer you an extension but the payment hasn’t been completed, it’s possible that they will delete the decryption key, making it impossible to recover the company’s files. Even if the payment is carried out, there is no guarantee that your data will be returned. This is because it is possible that the software developed by the cybercriminals contains bugs that cause a corruption in the decryption process, or law enforcement agencies are constantly trying to interrupt the cybercriminals infrastructure.
  • 8. 8 What to do if you are a victim of cyber extortion?
  • 9. 9 Don’t give in to the cybercriminals’ blackmail. There is no guarantee that this will solve the problem. In fact, in many cases, the victim of the blackmailing has given over the amount demanded but without receiving the decryption key (or even a corrupted key). None of these outcomes can help get the kidnapped information back. Repeated blackmailing is also common. Once the information is returned, the cybercriminals install processes which continue to encrypt the company’s data in no time. On other occasions, the cybercriminal negotiates a higher amount than originally demanded, depending on the perceived desperation of the victim or the company’s financial situation. Completely wipe all traces of malware from your computers. To do this, Panda recommends using Cloud Cleaner in offline mode, a solution that specializes in removing all traces of advanced viruses from affected computers. Recover all your encrypted files. To do this it is necessary to have previously activated the File History (in Windows 8.1 and 10) or System Protection (Windows 7 and Vista), which will allow for changes made by the malware on data files to be reversed. It is also recommended that you make security copies of critical files every so often. Should you have a recent backup of your important documents we advise scanning these for any remnants of malware before restoring them.
  • 10. It must be kept in mind that this type of threat has become extremely popular. In fact, ransomware is a billion-dollar industry. One estimate showed that a single strain of ransomware, Cryptowall 3.0, made over $325 million from US victims in 2015 alone. Besides, the increased number of mutations, coupled with new strains of ransomware that are constantly appearing, makes it difficult for traditional antiviruses that are based on signature files to detect them. This is why it is fundamental to have an advanced security solution that detects and protects your computers from direct attacks, Zero-Days, and new versions of Ransomware.
  • 11. 11 What does a malware consist of and what are the most common types? Well, it is any type of malicious program or IT code whose objective is to infiltrate networks and computers to cause damage, spy, and steal information. The most dangerous types of malware are: RANSOMWARE It blocks the PC, removing all user control, encrypts files and demands a financial ransom to return them. EXPLOIT It takes advantage of a security fault or vulnerability in the communication protocols to enter your computer. SPYWARE It collects names, access details, passwords, and any type of information about your company. PHISHING It creates a false URL to obtain your data and steal your identity, with the aim of stealing from your bank accounts. TROJAN It installs various applications so that hackers can control the computer. They control your files and steal your confidential information. APT (ADVANCED PERSISTENT THREAT) It’s a computer process that penetrates your security to control and monitor it, being able to continually extract information for business or political means. SCAM It tricks you with false promotions such as holidays or lotteries, then asks you for money to access the “prize”. BACKDOOR It opens a “back door” to take control of your system. KEYLOGGER It collects and sends all keystrokes completed by the user. BOT It is a program that remotely controls your PC. WORM It infects all of your computers, slowing down the network and even blocking access to communications.
  • 12. 12 Evolution of malware, complexity and sophistication. The technology used by traditional antiviruses (signature files, heuristic) are reactive. 18% of new malware isn’t detected by traditional antiviruses in the first 24 hours, and 2% is still undetected 3 months later. Can these antiviruses stop advanced threats? No antivirus can do this. In fact, There are websites online that allow you to see if a certain malware will be detected by an antivirus. Hackers then launch their malicious code once they have verified that it won’t be detected by any antivirus. 24 hours 3 days 7 days 1 month 3 months % Non-detected viruses 18% 9% 7% 4% 2% 70% 80% 90% 100%
  • 13. 13 Panda Security’s 5 Recommendations to prevent Cyberattacks
  • 14. 14 Develop internal protocols Establish protocols and security measures to control the installation and execution of any software. You should also check the inventory of your applications frequently. A solution that fit your needs Ensure that you have the security solution that your company needs and keep it updated. A solution with different security layers that should be able to detect and block advanced threats. Make your users aware Make sure that your users know the risks of phishing and that they don’t download unknown applications - or ones not provided by the company - and to avoid untrusted websites. Be aware on the Internet Set out policies for surfing the Internet that controls the reputation of websites that can be accessed. Keep your systems & applications updated Determine a policy for updating your applications and for blocking or eliminating them if they aren’t needed by the company. It is very important to get protected from applications that, even they are trustworthy (such us Java, Office, Chrome, Mozilla or Adobe), they can have some vulnerabilities or security holes that can be exploited by cybercriminals.
  • 15. 15 Image: The toolbars present a big security risk.
  • 16. 16 How can you really protect your company?
  • 17. 17 Panda Security has developed the first solution that guarantees continuous monitoring of 100% of the active processes. Panda Security has developed the only cybersecurity solution that is capable of protecting your company against direct attacks, Zero-Days, or any type of advanced threat, including Cryptolocker. It is the first product on the market that guarantees to completely protect computers and servers, thanks to continuously monitoring 100% of the processes on the endpoint.
  • 18. 18 Adaptive Defense 360 offers the greatest security levels available, far ahead of any other antivirus on the market. Adaptive Defense 360 monitors, registers, and classifies 100% of the running applications which, combined with EDR features, allows us to detect and block the malware that other protection systems don’t even see. Traditional Antiviruses They only recognize malware but nothing else. Adaptive Defense 360 It monitors absolutely all the active processes. Work flow Risk Managed Service Objective: 0 Risk As they can’t classify anything suspicious, these attacks represent a huge security problem for the traditional antivirus (especially targeted and zero-day attacks). Adaptive Defense 360 knows with certainty if a process is good or bad, it classifies absolutely everything so that there is no suspicion.
  • 19. 19 Being able to control absolutely everything that happens on your computers allows you to: Detect information leaks, both from malware and employees and from any archive that contains data (pdf, word, excel, txt,...). Discover and solve vulnerabilities on your systems and applications, and prevent the use of unwanted programs. Detect direct attacks aimed at your systems.
  • 20. 20 It detects and blocks the malware that other systems miss. Limitless Visibilty, Absolute Control Monitors, records and classifies 100% of running applications.
  • 21. 21 It protects more than 500,000 endpoints and servers worldwide. It has mitigated more than 1,100,000 security breaches in the last year alone. It has detected malware in 100% of the environments it has been installed in, independently of the existing protection mechanisms. It has saved more than 550,000 hours in IT resources, which amounts to an estimated saving of €34.8 million. It has categorized more than 1.5 million applications. What’s more, it comes with Panda Security’s 25 years of experience, which makes us a pioneer in malware detection and in implementing innovative security solutions. Not to mention that more than 30 million endpoints are currently protected by Panda worldwide. Adaptive Defense 360 in numbers 500K 1.5M 1.1M 550K 100% Data from 2015.
  • 22. BENELUX +32 15 45 12 80 belgium@pandasecurity.com BRAZIL +55 11 3054-1722 brazil@pandasecurity.com FRANCE +33 (0) 1 46842 000 commercial@fr.pandasecurity.com GERMANY (AND AUSTRIA) +49 (0) 2065 961-0 sales@de.pandasecurity.com GREECE +30 211 18 09 000 greece@pandasecurity.com HUNGARY +36 1 224 03 16 hungary@pandasecurity.com ITALY +39 02 24 20 22 08 italy@pandasecurity.com MEXICO +52 55 8000 2381 mexico@pandasecurity.com NORWAY +47 93 409 300 norway@pandasecurity.com PORTUGAL +351 210 414 400 geral@pt.pandasecurity.com SPAIN +34 900 90 70 80 comercialpanda@pandasecurity.com SWEDEN (FINLAND & DENMARK) +46 0850 553 200 sweden@pandasecurity.com SWITZERLAND +41 22 994 89 40 info@ch.pandasecurity.com UNITED KINGDOM +44 (0) 844 335 3791 sales@uk.pandasecurity.com USA (AND CANADA) +1 877 263 3881 sales@us.pandasecurity.com Contact us for more information